In a shocking video that was shown to the jury at trial, two nursing home aides appeared to stuff a latex glove into the mouth of a 96-year-old nursing home resident. The resident was sitting in a wheelchair. The undercover video helped change laws in many states. Families can legally hide cameras inside their loved one’s room.
Not Sure which Stun Gun is Right for you? See Our Online Buyer’s Guide Here: Stun Gun Buying Guide
Stun guns are small electrical devices that provide personal protection for those who carry them. They are non-lethal under most circumstances and are often carried by both men and women who want an extra measure of protection when they are alone.
In areas where stun guns are legal, there are generally no licensing requirements and no courses are offered in stun gun safety. This makes it important for each stun gun owner to take the time to familiarize themselves with the way stun guns work and how they should handle their stun gun for the most effective personal protection.
The first thing to do when a stun gun is purchased is to look over the device itself to become familiar with the important components. The button that activates the electric current should be located as well as the two contact probes that dispense this current. The probes are what will be held against an attacker in order to deliver the shock to them. Knowing exactly where they are will prevent the stun gun owner from accidentally shocking themselves when using it or testing it. Be sure to stay away from the contact probes, never touching them in order to avoid an accident.
Once these key parts are identified, the owner should make sure that the battery has enough power. Testing the stun gun periodically by holding it in the air and pushing the button will let the owner know whether the battery is still good. Having a stun gun with a dead battery can be dangerous for those who count on their stun guns for protection.
If a situation arises that calls for the use of the stun gun against an assailant, the stun gun must be close at hand in order to grab it quickly and use it. Plan out a place to keep it for just this type of emergency. Keeping it in a pocket or held onto the wrist with a strap will keep it close by. In a real emergency, there will be no time to dig through a bag to find the stun gun and prevent someone from committing violence.
Before discharging the electric current, make sure that your fingers or any other part of your body are not in contact with the current probes. The object is to shock the other person to allow the stun gun holder to get away. If both parties are shocked, the stun gun user may not get away safely.
The assailant holding on to the stun gun owner does not mean that the current will pass through both parties. Only direct contact with the probes will cause a shock. If the stun gun owners can’t shock the assailant without shocking themselves, they should wait for an opportune moment to do so instead of risking a shock to themselves. Some owners have scared away attackers simply by holding their stun guns in the air and activating the current. This may work in a situation where the attacker can’t be reached with the stun gun.
Are you more of a pepper spray person? If so, see our complete article on how to handle and use pepper spray properly against attackers.
Stun Guns in the News:
The bureau whose officers came under federal scrutiny in 2012 for a pattern of unwarranted use of stun guns has used a Taser model X26 since 2005 but the company discontinued making them at the end of last year.…
This cell phone-looking stun gun delivers 1,000,000 volts of lightning protection at the push of a button. Includes safety button extra-bright LED flashlight and case with belt clip. Requires three CR2 batteries included.…
How to search for and find concealed weapons – Places to Hide
Looking for concealed weapons means being thorough. Here are some of the ways they may think they can fool you.
1. Jamaican Holster – Made from thin metal like a coat hanger
2. The Headrest Compartment
The FBI is finding more and more of these compartments, where the back of the headrest flips open like a glove box. Most handguns can fit inside.
3. Hidden Compartments
A kidnap victim pointed out this hidden compartment below in a 2000 Cadillac Seville STS. The gun was found in a compartment that was revealed by pushing down on the tilt steering wheel adjuster.
Other hiding spots include:
3. Book Bombs
On Sept 10, 2001, Colombian National Police discovered this book. It was to have been used to assassinate a prominent presidential candidate. 5 Lbs of plastic explosives were found inside that could be detonated via remote control or cell phone.
4. Shot Gun Shell Booby Traps
During a drug investigation in Tillonsburg, England, 3 of these traps were found protecting a marijuana patch. The barrels were directed at the ground, but could be aimed to injure or kill those who activated the trip wires.
This last example shows how staying vigilant not only gets more contraband off the streets, but also may save your life.
Do you have a story of your own you would like to share? Post it in the comments below. You just may help someone else who finds themselves in the same circumstance later on.
Don’t forget to check out our surveillance equipment for police interrogation rooms. Many of the custom built cameras can have audio added if the products are built for Law Enforcement.
Part II of our series on concealed weapons – Knives and Blades
Sold as self defense weapons:
- Several on the market, sold at self defense stores, hardware stores, gas stations, and novelty stores
- Very realistic looking and could be overlooked
- Usually the blades are surgical steel and razor sharp
- The “Swiss-Tech Utili-Key” has half straight and half serrated edge.
1 Inch Knife Blade:
A Standard Ballpoint pen casing hiding a 2 5/8″ surgical steel blade, serrated towards the handle. Modified from a Parker ballpoint pen and still writes as a pen.
A Letter Opener:
A Walking Cane Dagger:
Contains both a 5″ and 18″ blade.
Baton Blade (Holds 2 Double Edged Swords)
Several models, usually sold at tobacco shops
Works “stilletto style”
Polymer Knife – No Metal
Hair Brush Dagger – Poly-Resin Blade
Bike Seat Dagger – You may not know its there:
See our next article on Places to Hide Concealed Weapons.
If you are looking to buy concealed cameras click here
Everyday items can be modified to be used as weapons.
Some are devised by the bad guys.
ALWAYS remember ~ many criminals are smarter than we think. NEVER underestimate the ones who were “dumb enough to get caught.”
Why should we worry?
Cell Phone Guns
- Several types have been found.
- Several of this model have been confiscated in Holland recently, usually along with high volumes of explosives and narcotics.
- Fires 4 .22 caliber ‘short’ rounds by pressing the keypad buttons…
The “Companion,” a 3 D-cell Mag-Lite flashlight converted into a shotgun capable of firing a .410 shotgun round. Manufactured by Ares Defense Systems. May be purchased on the Internet.Fully functional as a flashlight, it also works as a gun by pulling the safety pin, then pushing down on a spring-loaded firing pin. The projectile is discharged through the end cap of the flashlight. The company also sells a Mini-Mag-Lite (next slide). The items are covered by the National Firearms Act and possessing them requires you to have proper documentation of ownership.
- 4” mini-mag flashlight (2 AA battery size)
- Fires a single .380 round
- Has an optional end cap that makes it look like a mini kubotan, vs. a flashlight
- Used by fishermen and scuba divers to kill sharks and alligators.
- Fires a single 38 caliber short Colt, .38 special or .357 magnum cartridge.
- Considered to be a firearm when carried in a pocket or around the neck and used for other purposes.
- A 5-shot .22 caliber pistol with a grip that folds over the barrel and cylinder
- was concealed inside an eyeglass case when discovered
- fits in pockets, hats, etc.
World’s Smallest Gun
- Fires .45 ACP, .357 Magnum, or .38 Special rounds
- A break-down, single-shot, double action weapon made by Downsizer Corp.
- 3 ¼” long, 2 ¼” tall, and .90” thick.
- Imagine where this could be hidden…wallet, cigarette pack, palm, hats, etc., etc….
Hunting Knife Guns
- This is a 6-shot .22 caliber ‘pistol’
- Cylinder and firing mechanisms are concealed inside the handle.
- The handle breaks down and ‘ejects’ what becomes the grip and trigger
- Fairly accurate for firing due to it’s overall length
- Just under 6” with a 2” barrel
- “Stinger” model must be folded in half to fire, forms a handle to grip
- .25 caliber, .22 LR, or .380ACP
Some of the most commonly improvised firearms.
A handgun round is inserted snugly into a small diameter tube. That ‘loaded’ tube is then inserted into a larger pipe, which has an end cap with a piece of pointed metal inside it. When you slam the end cap back against a hard surface, the pointed metal strikes the primer of the round like a firing pin and discharges the weapon.
Fires a single .22 caliber Stinger. Pull back on spring-loaded hex head to fire.
5/8″ diameter, 4″ long.
The Club Shotgun
- The handle end of The Club has been hollowed out to act as a barrel
- When the lock end is pulled back, the interior metal cap (altered to act as a firing pin)
is pulled away from the round
- Fired by slamming the ends back together
The Screwdriver Gun
The Pressure Gauge Weapon
- Converted into .22 caliber pistol
- Does not have plastic measuring device in the center
- Last 1½ ” is a hardened steel barrel
- To fire, remove threaded top, drop in cartridge. Pull the top and let go. Spring-loaded action, just like a zip gun.
- ATF says possession is a federal crime, regardless of a person’s record.
Next Up: Part 2 – Concealed Weapons Police Should Know About – Knives and Blades
There have been reports that venomous bites can be treated by purchasing a stun gun. We’ve all seen movies where the hero burns a wound or tries to suck out poison from a wound and then moves on to get the bad guy. Unfortunately, these things do not always work when tested in reality. To answer this question, we have sourced a paragraph from the national institute of health, which reads:
“During the past 2 decades, articles suggesting that stun guns be utilized to treat venomous bites and stings have appeared in both the lay and medical press. Although never widely considered to be standard therapy for venomous bites and stings, stun guns are still considered to be a treatment option by some medical practitioners and outdoor enthusiasts. A Medline search was performed using these terms: venomous bites, venomous stings, snake bites, spider bites, electrical, stun gun, high voltage electricity, low amperage electricity, direct current, and shock therapy. Articles selected included laboratory-based isolated venom studies, animal studies, and case reports involving humans in which a stun gun or some other source of high voltage, low amperage direct current electric shocks were used to treat actual or simulated venomous bites or stings. We concluded that the use of stun guns or other sources of high voltage, low amperage direct current electric shocks to treat venomous bites and stings is not supported by the literature.”
There are numerous articles on this subject which can be seen here: Snake Bites, Venom, and Stun Guns.
Although buying stun guns can save your life, they are not the “panacea” of safety. Awareness will always provide you with greater efficacy in protecting yourself and your loved ones.
A never-Ending Necessity – The Ten Commandments of Counterintelligence
The need for counterintelligence (CI) has not gone away, nor is it likely to. The end of the Cold War has not even meant an end to the CI threat from the former Soviet Union. The foreign intelligence service of the new democratic Russia, the Sluzhba Vneshney Razvedki Rossii (SVRR), has remained active against us. It was the SVRR that took over the handling of Aldrich Ames from its predecessor, the KGB, in 1991. It was the SVRR that ran CIA officer Harold James Nicholson against us from 1994 to 1996. It was the SVRR that was handling FBI special agent Earl Pitts when he was arrested for espionage in 1996. It was the SVRR that planted one of their listening devices in a conference room of the State Department in Washington in the summer of 1999. And it was the SVRR that was handling FBI special agent Robert Hanssen when he was arrested on charges of espionage in February 2001.
The Russians are not alone. There have been serious, well-publicized concerns about Chinese espionage in the United States. The Department of Energy significantly increased security at its national laboratories last year in response to allegations that China had stolen US nuclear weapons secrets.
Paul Redmond, the former Associate Deputy Director of Operations for Counterintelligence at the CIA, told the House Permanent Select Committee on Intelligence in early 2000 that a total of at least 41 countries are trying to spy on the United States. Besides mentioning Russia, China, and Cuba, he also cited several “friends,” including France, Greece, Indonesia, Israel, the Philippines, South Korea, and Taiwan. He warned of a pervasive CI threat to the United States.
The United States, as the world’s only remaining superpower, will be the constant target of jealousies, resentments, rivalries, and challenges to its economic well-being, security, and leadership in the world. This inevitably means that the United States will be the target of large-scale foreign espionage.
A Choice Assignment
When I joined the CIA, one of my first interim assignments was with the old CI Staff. I found it fascinating. I was assigned to write a history of the Rote Kapelle, the Soviet espionage network in Nazi-occupied Western Europe during World War II.
With its expanded computer power, NSA was breaking out the actual messages sent between the NKVD center in Moscow and the clandestine radios of the various cells in Western Europe. Incredibly, these messages came to me.
There I was, a brand new junior officer, literally the first person in the CIA to see the day-to-day traffic from these life-and-death operations. I was deeply affected by the fear, heroism, and drama in these messages. Above all, I felt privileged to have been given such an opportunity.
Building on an earlier study of the Rote Kapelle by the CI Staff, I completed a draft several months later that incorporated the new material. To my great surprise, this study was well received by my immediate superiors, and I was told that I was to be rewarded with a personal interview and congratulations from James Jesus Angleton, the legendary head of the CI Staff from 1954 to 1974.
Angleton’s office was on the second floor of the Original Headquarters Building. I was first ushered into an outer office, where Angleton’s aides briefed me on how to conduct myself. Then I went alone into the inner sanctum.
The room was dark, the curtains were drawn, and there was just one small lamp on Angleton’s desk. I later heard that Angleton had eye trouble and that the light hurt his eyes, but I was convinced the real reason for the semidarkness was to add to his mystique. It certainly worked on me!
I nervously briefed Angleton on my study, and he listened without interrupting, just nodding from time to time. When I finished, he methodically attacked every one of my conclusions. Didn’t I know the traffic was a deception? Hadn’t it occurred to me that Leopold Trepper, the leader of the Rote Kapelle, was a German double? He went on and on, getting further and further out.
Even I, as a brand new officer, could tell that this great mind, this CI genius, had lost it. I thought he was around the bend. It was one of the most bizarre experiences of my career.
When the meeting was over, I was glad to get out of there, and I vowed to myself that I would never go anywhere near CI again. I did not keep that vow. In my overseas assignments with the Agency, I found myself drawn toward Soviet CI operations. Nothing seemed to quicken my pulse more, and I was delighted when I was called back to Headquarters in 1989 to join the new Counterintelligence Center (CIC) as Ted Price’s deputy. When Ted moved upstairs in early 1991 to become the Associate Deputy Director for Operations, I was named chief of the Center.
Today, many years after that initial disagreeable encounter with CI, I find it hard to believe that it is actually my picture on the wall of the CIC conference room at CIA Headquarters, where the photos of all former CIA counterintelligence chiefs are displayed. There I am, number seven in a row that begins with Angleton.
So, after a career that ended up being far more CI-oriented than I could ever have imagined, I would like to offer some personal observations in the form of “The Ten Commandments of Counterintelligence.” I have chosen the form of commandments because I believe the basic rules of CI are immutable and should be scrupulously followed. In my view, it makes little difference whether the adversary is the Russians, the Cubans, the East Germans, the Chinese, or someone else. It likewise makes little difference whether we are talking about good CI practices in 1985 or in 2005. Unfortunately, as I watch US CI today, I am increasingly concerned that the principles I consider fundamental to effective CI are not being followed as carefully and consistently as they should be.
These commandments were not handed down to me from a mountaintop, and I make no claim that they are inspired or even definitive. They are simply the culmination, for what they are worth, of my experience. They are intended primarily for my fellow practitioners in CI today, but also for any younger officers in the Intelligence Community (IC) who might someday want to join us.
The First Commandment: Be Offensive
CI that is passive and defensive will fail. We cannot hunker down in a defensive mode and wait for things to happen. I believe we are spending far too much money on fences, safes, alarms, and other purely defensive measures to protect our secrets. That is not how we have been hurt in recent years. Spies have hurt us. Our CI mindset should be relentlessly offensive. We need to go after our CI adversaries.
Aggressive double agent (DA) operations are essential to any CI program, but not the predictable, hackneyed kind we have so often pursued. We need to push our bright and imaginative people to produce clever new scenarios for controlled operations, and we need more of them. The opposition services should be kept constantly off guard so that they never suspect that we have actually controlled the operations they believe they initiated from the beginning. When the requirements, modus operandi, and personality objectives of the DA operation have been achieved, we should in a greater number of cases pitch the opposition case officer. If only one out of 10 or 20 of these recruitments takes, it is worth it. And CI professionals, of course, should not rely exclusively on their own efforts. They should constantly prod their HUMINT colleagues to identify, target, and recruit officers from the opposition intelligence services. The key to CI success is penetration. For every American spy, there are several members of the opposition service who know who he or she is. No matter what it takes, we have to have penetrations.
We should operate aggressively against the nontraditional as well as the traditional adversaries. How many examples do we need of operations against Americans by so-called friendly countries to convince us that the old intelligence adage is correct: there are friendly nations, but no friendly intelligence services. If we suspect for whatever reason that the operatives of a foreign intelligence service, friend or foe, are operating against us, we should test them. We should dress up an enticing morsel, made to order for that specific target, and send it by them. If they take it, we have learned something we needed to know, and we have an operation. If they reject it, as true friends should, we have learned something, too. In either event, because we are testing a “friend,” plausible deniability has to be strictly preserved. Every foreign service is a potential nontraditional adversary; no service should get a lifetime pass from US offensive CI operations.
The Second Commandment: Honor Your Professionals
It has been true for years—to varying degrees throughout the IC—that CI professionals have not been favored, to the extent they deserved, with promotions, assignments, awards, praise, esteem, or other recognition. The truth is that CI officers are not popular. They are not always welcome when they walk in. They usually bring bad news. They are easy marks to criticize when things go wrong. Their successes are their failures. If they catch a spy, they are roasted for having taken so long. If they are not catching anyone, why not? What have they done with all that money they spent on CI? It is no-win.
For much of my career, many of our best people avoided becoming CI specialists. CI was not prestigious. It had a bad reputation. It was not fast track. It did not lead to promotions or good assignments. Angleton left a distasteful legacy that for years discredited the CI profession. Ted Price did more than anyone else in the Agency to reverse that trend and to rehabilitate CI as a respected professional discipline.
Nevertheless, that battle is still not completely won. We have to do more to get our CI people promoted, recognized, and respected so that our best young officers will be attracted to follow us into what we know is a noble profession and where the need is so great.
The Third Commandment: Own the Street
This is so fundamental to CI, but it is probably the least followed of the commandments. Any CI program worthy of the name has to be able to engage the opposition on the street, the field of play for espionage. And when we do go to the street, we have to be the best service there. If we are beaten on the street, it is worse than not having been there at all.
For years, we virtually conceded the streets of the world’s capitals, including the major espionage centers, to the KGB, the GRU, and the East European services because we either did not know how to do it or we were not willing to pay the price for a thoroughly professional, reliable, full-time, local surveillance capability.
Opposition intelligence officers have to be watched, known meeting areas have to be observed, and, when an operation goes down—often on short notice—undetectable surveillance has to cover it, identify the participants, and obtain evidence.
This capability is expensive—selection, training, vehicles, photo gear, video, radios, other real spy equipment, safe apartments, observation posts, and on and on—but, if we do not have it, we will be a second-rate CI service and will not break the major cases.
The Fourth Commandment: Know Your History
I am very discouraged when I talk to young CI officers today to find how little they know about the history of American CI. CI is a difficult and dangerous discipline. Many good, well-meaning CI people have gone wrong and made horrendous mistakes. Their failures in most cases are well documented, but the lessons are lost if our officers do not read the CI literature.
I find it inconceivable that any CI practitioner today could ply his or her trade without an in-depth knowledge of the Angleton era. Have our officers read Mangold? Have they read Legend and Wilderness of Mirrors? Do they know the Loginov case, HONETOL, MHCHAOS, Nosenko, Pollard, and Shadrin? Are they familiar with Aspillaga and the Cuban DA debacle? Have they examined our mistakes in the Ames and Howard cases? Are they staying current with recent releases like The Mitrokhin Archive and The Haunted Wood?
I believe it is an indispensable part of the formation of any American CI officer—and certainly a professional obligation—to study the CI failures of the past, to reflect on them, and to make sure they are not repeated.
The many CI courses being offered now are a positive step, but there will never be a substitute for a personal commitment on the part of our CI professionals to read their history, usually on their own time at home.
The Fifth Commandment: Do Not Ignore Analysis
Analysis has too often been the stepchild of CI. Throughout the CI community, we have fairly consistently understaffed it. We have sometimes tried to make it up as we go along. We have tried to do it on the cheap.
Generally speaking, operators make bad analysts. We are different kinds of people. Operators are actors, doers, movers and shakers; we are quick, maybe a little impulsive, maybe a little “cowboy.” Our best times are away from our desks. We love the street. Research and analysis is really not our thing—and when we have tried to do it, we have not been good at it.
True analysts are different. They love it. They are more cerebral, patient, and sedentary. They find things we could not. They write better.
A lot of CI programs in the past have tried to make operators double as their own analysts. As a result, in the United States, CI analysis historically has been the weakest part of the business. Professional CI analysts have been undervalued and underappreciated.
A good CI program will recruit and train true analysts in sizable numbers. I do not think it would be excessive as a rule of thumb in a top notch CI service to be evenly divided between operators and analysts. Very few of our US CI agencies come anywhere close to that ratio.
Wonderful things happen when good analysts in sufficient numbers pore over our DA reports, presence lists, SIGINT, audio and teltap transcripts, maps, travel data, and surveillance reports. They find the clues, make the connections, and focus our efforts in the areas that will be most productive.
Many parts of the US CI community have gotten the message and have incorporated trained analysts into their operations, but others have not. Across the board, we still have serious shortfalls in good, solid CI analysis.
The Sixth Commandment: Do Not Be Parochial
More harm probably has been done to US CI over the years by inter-agency sniping and obstruction than by our enemies. I remember when the CIA and the FBI did not even talk to each other—and both had disdain for the military services. It is no wonder that CI was in shambles and that some incredibly damaging spies went uncovered for so long.
Occasionally in my career, I encountered instances of sarcasm or outright bad mouthing of other US Government agencies by my officers. That kind of attitude and cynicism infected our junior officers and got in the way of cooperation. These comments often were intended to flaunt our supposed “superiority” by demeaning the capabilities of the other organizations. I dealt with these situations by telling the officers to “knock it off,” and I would encourage other CI supervisors around the community to do the same.
CI is so difficult, even in the best of circumstances, that the only way to do it is together. We should not let personalities, or jealousies, or turf battles get in the way of our common mission. Our colleagues in our sister services are as dedicated, professional, hardworking, and patriotic as we are, and they deserve our respect and cooperation. The best people I have known in my career have been CI people, regardless of their organizational affiliation. So let us be collegial.
The Seventh Commandment: Train Your People
CI is a distinct discipline and an acquired skill. It is not automatically infused in us when we get our wings as case officers. It is not just a matter of applying logic and common sense to operations, but is instead a highly specialized way of seeing things and analyzing them. CI has to be learned.
I do not know how many times in my career I have heard, “No, we do not really need a separate CI section. We are all CI officers; we’ll do our own CI.” That is a recipe for compromise and failure.
There are no substitutes for professional CI officers, and only extensive, regular, and specialized CI training can produce them. Such training is expensive, so whenever possible we should do it on a Community basis to avoid duplication and to ensure quality.
CI is a conglomerate of several disciplines and skills. A typical operation, for example, might include analysts, surveillance specialists, case officers, technical experts, and DA specialists. Each area requires its own specialized training curriculum. It takes a long time to develop CI specialists, and that means a sustained investment in CI training. We are getting better, but we are not there yet.
The Eighth Commandment: Do Not Be Shoved Aside
There are people in the intelligence business and other groups in the US Government who do not particularly like CI officers. CI officers have a mixed reputation. We see problems everywhere. We can be overzealous. We get in the way of operations. We cause headaches. We are the original “black hatters.”
Case officers want their operations to be bonafide. Senior operations managers do not want to believe that their operations are controlled or penetrated by the opposition. There is a natural human tendency on the part of both case officers and senior operations managers to resist outside CI scrutiny. They believe that they are practicing good CI themselves and do not welcome being second-guessed or told how to run their operations by so-called CI specialists who are not directly involved in the operations. I have seen far more examples of this in my CI career than I care to remember.
By the same token, defense and intelligence contractors and bureaucrats running sensitive US Government programs have too often tended to minimize CI threats and to resist professional CI intervention. CI officers, in their view, stir up problems and overreact to them. Their “successes” in preventing CI problems are invisible and impossible to measure, but their whistle blowing when problems are uncovered generate tremendous heat. It is not surprising that they are often viewed as a net nuisance.
When necessary, a CI service has to impose itself on the organizations and groups it is assigned to protect. A CI professional who is locked out or invited in only when it is convenient to the host cannot do his job.
My advice to my CI colleagues has always been this: “If you are blocked by some senior, obtuse, anti-CI officer, go around him or through him by going to higher management. And document all instances of denied access, lack of cooperation, or other obstruction to carrying out your CI mission. If not, when something goes wrong, as it likely will in that kind of situation, you in CI will take the blame.”
The Ninth Commandment: Do Not Stay Too Long
CI is a hazardous profession. There should be warning signs on the walls: “A steady diet of CI can be dangerous to your health.”
I do not believe anyone should make an entire, uninterrupted career of CI. We all who work in CI have seen it: the old CI hand who has gotten a bit spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling prey eventually to creeping paranoia, distortion, warping, and over zealousness in one’s thinking. It is precisely these traits that led to some of the worst CI disasters in our history. Angleton and his coterie sadly succumbed, with devastating results. Others in the CIA and elsewhere have as well. The danger is always there.
My wife, who was working at the CIA when I met her, was well acquainted with this reputation of CI and the stories about its practitioners. When I was serving overseas and received the cable offering me the position as Ted Price’s deputy in the new Counterintelligence Center, I discussed it with her that evening at home. Her response, I thought, was right on the mark: “Okay, but do not stay too long.”
Sensible and productive CI needs lots of ventilation and fresh thinking. There should be constant flow through. Non-CI officers should be brought in regularly on rotational tours. I also believe it is imperative that a good CI service build in rotational assignments outside CI for its CI specialists. They should go spend two or three years with the operators or with the other groups they are charged to protect. They will come back refreshed, smarter, and less likely to fall into the nether world of professional CI: the school of doublethink, the us-against-them mindset, the nothing-is-what-it-seems syndrome, or the wilderness of mirrors.
The Tenth Commandment: Never Give Up
The tenth and last commandment is the most important. What if the Ames mole hunters had quit after eight years instead of going into the ninth? What if, in my own experience, we had discontinued a certain surveillance operation after five months instead of continuing into the sixth? CI history is full of such examples.
The FBI is making cases against Americans today that involved espionage committed in the 1960s and 1970s. The Army’s Foreign Counterintelligence Activity is doing the same. The name of the game in CI is persistence. CI officers who are not patient need not apply. There is no statute of limitations for espionage, and we should not create one by our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep. I applauded my CI colleagues in the FBI when I read not long ago of their arrest in Florida of a former US Army Reserve colonel for alleged espionage against the United States many years earlier. They obviously never gave up.
If we keep a CI investigation alive and stay on it, the next defector, the next penetration, the next tip, the next surveillance, or the next clue will break it for us.
If there were ever to be a mascot for US counterintelligence, it should be the pit bull.
These are my ten commandments of CI. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as an Intelligence Community we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics, or even the priorities. What we should agree on, however, is that strong CI has to be a national priority. Recent news reports from Los Alamos, Washington, and elsewhere have again underscored the continuing need for CI vigilance.
Original Article by James M. Olson
James M. Olson served in the Directorate of Operations and is now on the faculty of the George Bush School of Government and Public Service at Texas A&M University.
Although not every place is as dangerous to cops as New York City or the State of Texas, the job of serving the public by keeping them safe always means placing yourself in harms way.
Below is an infographic made in deference to all the police officers who have given their lives to keep us safe.
Image created by:Instant Checkmate
When we think of “Real Spy Gear” we think of advanced espionage equipment used by the CIA and other agencies, but just because a spy gadget is “out of date” does not mean it isn’t real. In fact some of the older surveillance equipment and spy gadgets from WWII and the cold war, are also some of the coolest.
The first intelligence agency in the USA was the OSS, or Office of Strategic Services. OSS activities created an ongoing demand for spying devices and surveillance equipment that could be used to trick, attack, or demoralize the enemy. Finding few agencies or corporations willing to undertake this sort of low-volume, highly specialized work, Franklin D Roosevelt recruited General Donovan (The Father of American Intelligence) to fabricate the tools that OSS needed for its clandestine missions (Similar to the British MI6). By the end of the war, OSS engineers and technicians had formed a collection of labs, workshops, and experts that occasionally gave OSS a technological edge over its Axis foes.
The Special Operations and Secret Intelligence Branches frequently called on the technical prowess assembled in the Research & Development Branch (R&D) and related offices. R&D proved adept at inventing weapons and James Bond type spy gadgets and in adapting Allied equipment to new missions. General Donovan hired Boston chemist and executive Stanley P. Lovell to be his “Professor Moriarty” in charge of R&D. The Division’s products ranged from silenced pistols to limpet mines to “Aunt Jemima,” an allegedly explosive powder packaged in Chinese flour bags. Tiny cameras and inconspicuous letter-drops were devised to assist OSS agents in enemy territory. A companion unit, located in the Communications Branch but also confusingly titled the Research and Development Division, developed wiretap devices, electronic beacons for agents in the field, and excellent portable radios (particularly the “Joan-Eleanor” system, which allowed an agent to converse securely with an aircraft circling high overhead).
R&D’s components also fabricated the myriad papers that an agent needed to create a plausible identity behind enemy lines. The latest German and Japanese-issued ration cards, work passes, identification cards, and even occupation currency all had to be secretly acquired, perfectly imitated, and securely passed to operatives preparing for missions that could end in sudden death if any part of their cover stories went awry. An agent’s appearance had to be just as carefully prepared. In the words of the OSS official history:
…each agent had to be equipped with clothing sewn exactly as it would have been sewn if it were made in the local area for which he was destined; his eyeglasses, dental work, toothbrush, razor, brief case, travelling bag, shoes, and every item of wearing apparel had to be microscopically accurate.
The growing number of OSS coastal infiltration and sabotage projects eventually gave rise to an independent branch, the Maritime Unit, to develop specialized boats, equipment, and explosives. The Unit fashioned underwater breathing gear, waterproof watches and compasses, an inflatable motorized surfboard, and a two-man kayak that proved so promising that 275 were ordered by the British.
Some OSS schemes had a Rube Goldberg feel about them that seems almost comical today. Project CAMPBELL, for instance, was a remote-controlled speedboat, disguised as a local fishing craft and guided by aircraft, that would detonate against an anchored Japanese ship. The prototype sank a derelict freighter in trials, but the US Navy had no way of getting close enough to a Japanese harbor to launch CAMPBELL, and declined to develop the weapon. R&D built plenty of devices of its own that looked good on paper but either failed in tests or proved too impractical for combat use. But America was locked in a war for its very survival, and R&D chief Stanley Lovell felt that no idea could be overlooked: “It was my policy to consider any method whatever that might aid the war, however unorthodox or untried.” Failures were accepted as a cost of doing business.
For More information on weapons and spy gear see the original publication in the library section of the Central Intelligence Agency’s website.
Take a look at the recent FBI statistics on crime. The escalated rate of crimes particularly involving women as victims should reinforce your need to take a proactive stance in self defense techniques.
That is why you should not leave home without the lipstick pepper spray stashed in your hand bag. With the lipstick pepper spray in your bag, you will feel more in control in unexpected situations and be able to project an aura of confidence that may by itself prevent a possible attack.
The lipstick pepper spray is handy to have around not only to protect you from a human attack but from canine or any other animal attack.
The pepper spray holds 20 half second bursts that can be sprayed up to a 10 feet distance. The container looks no different than the average lipstick tube but only you will know that it is sheathing a potent self protection spray system.
The Lipstick pepper spray is an exclusive woman oriented self defense device optimizing your need for a subtle and convenient means of self protection. The moment you come in to contact with a person who makes you uncomfortable or feel threatened, simply reach in your pocket or handbag and take out the lipstick. Then remove the cap and keep it ready for instant use. The element of surprise will provide you with ample getaway time.
The spray does not cause any permanent damage or health risk. A burst from the spray to the face will result in temporary blindness, coughing, nausea, choking and in effect will bring the attacker on to his knees.
The lipstick tube can be bought in five tasteful colors including silver, blue, pink, black or red.
It is an ideal choice as gift for a girl friend, sister, mother, daughter, wife or any other women you want to help protect.
Don’t forget to read our article on How To Use Pepper Spray Effectively